ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

LAN Technologies: Impact, Design, Implementation, and Management

Verified

Added on  2024/06/04

|10
|4281
|127
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
LO1 Understand the impact of LAN technologies
Task 1
A.C 1.1 critically evaluate different LAN technologies
Ans. An organization almost has the ownership of the whole network in the campus . Networks exist of
Ethernet , higher-speed Fast Ethernet, Gigabit Ethernet LANs,802.11 Wireless LANs, Fast Ether channel.
Institute of Electrical and Electronics Engineers (IEEE) Ethernet (802.3):
Ethernet comes under LAN technology which is derived from the Institute Of Electrical and Electronics
Engineers(IEEE) 802.3 standard and provides a 10Mbps bandwidth among two users or computers .LAN
Technology provides connection to other computer by technology of Ethernet and the speed which is
required is 10 Mbps among all the users.
For transmitting and getting at the same time stations work in full duplex mode. Full-duplex mode makes
execution of system along with a net where there is throughput of about 10 Mbps in all the heading or there
is throughput of 20 Mbps on every port.
Today, it is considered as the widest LAN technology .Electronically, It is taken in use for transferring the
media on a local area network . So, Ethernet can help in transferring the data to the computers who all are
connected locally the data includes videos , graphic and music. Star topology is deployed in the connection
of Ethernet. 48 bit MAC address is what the network connectors consist of Ethernet operates through that
only which helps in building the communication among the devices that are used in Ethernet. It extends to:
Fast Ethernet: Fast Ethernet provides a speed of 1000mbps which can run on optical fibre , UTP and
wireless. Normally in the Ethernet it uses CD but in fast Ethernet it uses CSMA/ CA which is basically
take in use to handle the expanding need for fast software and hardware technology.
Virtual LAN:
Virtual LAN is a process through which a single network of LAN is divided into more than two networks
in a virtual way. Virtually the host can each other as the host are not able to see each other physically. This
has been done for managing the bandwidth and the hike in the efficiency of the network gives the host a
good opportunity and metrics of security.
The examples mentioned above can take in use the LAN technologies which can be a mixture of both
technologies of LAN which are virtual since wireless LAN help in connecting all the departments which
are required and also the required centres .To safeguard the security virtual LAN is going to help and every
department needs its privacy.
Half-Duplex:
Half duplex is a part of LAN technologies .Half duplex have a lot of appliance that are working with it. In
half-duplex it follows these following steps:
1. Network interface card(NIC) send the frame.
2. Receiving pair has frame sent to it by NIC loops
3. frame is receieved by HUB.
4.To make other NICs receive electrical signal the frame by HUB on internal bus relays.
5.All the device available at the network through HUB repeats the signal which is received from all the
individual receiving pair.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Fast Ethernet IEEE 802.3u:
To increase expand transfer speed in environment of Ethernet is done by Fast Ethernet. Fast Ethernet keep
up the cabling plans of Ethernet, operations of CSMA/CD and all the convention operations of upper layer.
LAN Hardware:
Here, this portion covers the network devices hardware or hardware for LAN device .
Repeaters:
In a system the repeaters is a basic unit which units the single divisions . In the OSI model repeaters works
at the physical layer. Repeaters are considered straightforward because repeaters have no knowledge about
the upper layer conventions which includes IP, Internetwork Packet Exchange and many more.
HUB:
In LAN technology Hub is considered as a basic unit . The main difference between the hubs and the
repeaters is that it has more ports.
Bridges:
Bridges works on the principle of store-and-forward . where they keeps the whole frame or datagram and
then before forwarding it examine the cyclic redundancy check . If an error of Cyclic redundancy check is
found in either the frame or datagram then that frame or datagram is going to be discarded . Bridges are
ignorant of the protocols of upper layer. Bridges are taken in use to implement Spanning Tree
protocol(STP) for the purpose of manufacturing a system topology which is circle free. For the purpose of
trading data bridges correspond with one another.
Switches:
Switch is a more efficient LAN appliance . Switches runs in a cut –through mode where the switches does
not sit in a same position for the whole edge or datagram.
Broadcasts:
Specific edges or datagram is considered as broadcasts. FF-FF-FF-FF-FF-FF is a MAC address for telecast
it is considered as most surprising number which has been allowed in the MAC locations of 48-blueprint.
A.C 1.2 critically analyse traffic intensive services and their performance
Ans. When video streams or downloading a program is intense traffic which basically means that the
traffic on the network is busy because of the high demand of the activities. Email , chat ,web browsing and
many more are not considered as traffic intensive and do not take in use the resources of network like
downloading of large files, video .
Quality of service and the management of bandwidth is a vital in computer networking system because it
helps in analysing the performance and evaluating the performance and using different techniques it can
make it better.
A.C.1.3 Discuss LAN concerns and make recommendations to sustain network security, reliability
and performance
Document Page
Ans. Since Local Area Network is considered as a local network has its benefits . The network has
data available on it because of which the local sharing is made possible to each the user present
excluding the user needs the data or the user wants the data. Because of which the exclusive data
present on the network is visible to all the parties using it which compromises the security of the
user. LAN network has a disadvantage of minimum security across its user so it is evident the major
security issues which is faced is internal not external. These situations are generally avoided since
NIU’s has been designed to avoid such data but due to some reason when it does not happen the
dynamics of security gets affected. LAN networks often get attacked by wiretapping which consist
of intercepting the personal information by someone who is not authorized and the other reason
why it happens because the network is not properly protected with firewalls. The issues of
performance in LAN is directly linked with the security, Quality of service, bandwidth as the user
become a part of the adequate use of network resources as its performance is being compromised.
There are many benefits which are provided by the wireless LANs but there are several concerns
also which the LAN face . firstly is the multipath propagation where the transmitted signals merges
with the reflected signals to shades the signal diagnose with the help of the receiver. This is
considered as the multipath distortion . Multipath propagation can be a notable issue and can be
more problematic for indoor application. The loss of path between the transmitter and receiver is a
thing which needs to be considered while a wireless LAN is being designed . The levels of path loss
expected according to the value between the transmitter and receiver , giving significant
information when evaluating requirements for levels of power being transmitted , sensitivity
receiver and signal to noise ratio (SNR). The major loss of path depends on the frequency
transmitted. Radio Signal interference feels interference from inward because transmitting systems
harmonics or also from products having radio frequencies of same kind in the region which is local.
Interference from outward occurs when the network signal of wireless is disrupting other systems
which is adjacent wireless LANs and the equipment for navigation used in aircraft.
In the hierarchical models of network consist of distributing the whole model into parts where
every individual layer is accountable for their functions which is profitable for the network when the
security is taken into consideration as each and every function operates independently to others .
The model of heirarchical network turns the network into being more scalable , increase
maintainability , reduces redundancy and manageability and turn the focus on work and privacy.
LO2 Be able to design LAN infrastructures
A.C 2.2 critically evaluate the suitability of LAN components
Document Page
Security:
There should have a strong security system in the network. Firewalls looks on the issue of security in
network communication . Within an organization the Flow of information should be free along with the
internet access . In between two forms of communication firewell is the best and most secure . In firewall
the information has been broken in the form of data packets which can interact only in one condition if
the citation given is similar. Excluding all this the modems taken in use should be secure to achieve a
network communication which is secure.
Scalability:
To achieve scalability there are two ways:
Vertical:
This method adds more hardware which includes RAM, more nodes or processor. Load balancer is also
introduced which is going to help in the calls which are incoming to several servers dependent upon the
routing algorithm taken in use . This application can manage huge amount of load as the load is
distributed among the servers.
Horizontal:
Horizontal scaling design in such a way the application that it will perform good in a equivalent traffic .
Memory, cache , sessions and state needs to be managed by the user. If the user is taking use of the
session for managing the information , it will require more effort to manage the server when there is
heavy load in the single server so , in a condition like this it can be checked if there is possibility of going
stateless.
Availability:
Availability is a method which is taken into consideration according to the user. If the failure happen in the
component of the whole system is not going to be disturbed but that is going to be possible only for the
first level of networking there is a high probability that the situation may turn opposite while moving to
the second layer as if there is a problem in any of the layer either first or second it is going to disrupt the
whole system . This situation can be termed as the maximum availability.
LO3 Be able to implement LAN infrastructures
Task 3
A.C 3.1 build and configure a LAN (including services) to meet a given requirement
Ans. Building a LAN:
In order to build a LAN firstly there needs to be a decision made on the network topologies which is going
to give support to the flow of information on a network according to your choice. There are several
topologies which include bus topology, tree topology, star topology, Mesh topology etc. Mesh topology is
taken when for use for the network of communication. Nowdays , traditional Local Area Ntwork has been
replaced by the Ethernet.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
A switch is taken in use to join two devices or many devices in a network, In LAN connection it is present in
plural or singular form . In a connected system it helps to interchange information or data after that it is
connected to the router which is helpful for the web traffic to position and direct. In more boarder way it
is considered as MAN or WAN.
Configuration of LAN:
The firewall consists of the functions which is required for the Formation of Local Area Network. VPN
firewall works on the Dynamic Host Configuration Protocol Server also considered as DHCP. It helps to
assign the address of the gateway, IP address etc. To configure the LAN following steps are needed to be
taken into consideration.
1. Need to visit network configuration and then select LAN setup.
2. if the router is required need to enter after the IP address.
3. The numeric of the network is reckoned through router.
4. Then it enables the DHCP server following steps are taken:
The router has its domain name which needs to be entered.
The IP address of the starting and ending is needs to be mentioned.
Clients can check the lease time.
The proxy box of Domain Name System is enabled and verified.
Completing all the steps mentioned above is done then Apply needs to be clicked.
A.C 3.2 implement network security on a LAN
Ans: Port Blocking/Filtering:
Representation of information in the form of data packets. Firewall here is acting as a watcher which does
not allow the stuffs which are not authorized to access the vital information . Although internet is useful in
many ways but through internet a lot of viruses can be entered into your system which is going to disrupt
the security of on organization. Firewall helps in sieving all the information that is not useful and
problematic for the organization.
Authentication:
It can not be considered same as the authorization . In authentication it is ensured that the person he/she
claims to be is actually the true identity of that person. It is a simple process but it is not as efficient in
comparison to the authorization. Authentication just do the basic process of making sure that identity of
a person is real and true what he or she is claiming to be.
Encryption:
It is considered as the secured process in a network communication which makes sure that any person
who is not authorized or information from getting into the system. It do the process of authentication by
using the concept of cryptography. As it is known that in today’s world almost all the information is
exchanged on the internet so to make sure that the information will not be accessed by some
unauthorized person it is encrypted in such a way that the sender can only and the one at receiving end
can understand it. This makes sure that the information is confidential when having network
communication.
VLANs(Virtual Local Area Networks):
Document Page
This is the process where the high security can be achieved in the process if communication over the
network also known as Virtual-LAN in VLAN which has features like packets filtering , traffic direction etc.
Using an management for efficiency it provides high scalable and management of network.
A.C 3.3 critically review and test a LAN
To verify the configuration of the LAN and the working of LAN . Firstly , there needs to be certainty about
the system’s ability if there is an interaction after the process of booting is done.
The steps will be :
This is a process of Linux boot . Firstly on command prompt type ‘reboot’
Field of hostname is going to be displayed as the way it has been assigned.
The lo and eth0 interfaces will display [ok].
After that it can be confirmed that the test is success.
To verify for the process of communication is replace properly on ping will be on the system is used.
ping <IP address> or <hostname> where <IP address> or <hostname>. Everything should be done in a
careful way because if it is not handled carefully it may turn out to be a error.
If configuration of DNS name server has been done where using a specific IP address hostname should be
resolved if not then using their own IP address system should be accessed . To determine whether the
systems have communication among each other ping command is going to help. In the form of packets
the information will be arranged which will appear as:
64 bytes from 192.168.0.1:icmp_seq=0 ttl=255 time=0.8ms
64 bytes from 192.168.0.1:icmp_seq=0 ttl=255 time=0.8ms
64 bytes from 192.168.0.1:icmp_seq=0 ttl=255 time=0.8ms
Local Area network for host in addition to the number of host which has been communicating through
the command of ping is equal to the “192.168.1”. To end the test Ctrl+C key is used and the details are
mentioned below:
- db.dot.edu ping statistics –
4 packets received , 4 packets transmitted , 0%packet loss
round-trip min/avg/max = 0.3/0.4/0.8 ms
Packet should have only 0% error if not it will be a failure in the process.
From db.dot.edu (192.168.1.1): Destination Host Unreachable
Assumption is made that there is no interaction with each other.
After that ‘Troubleshooting the LAN.’
Document Page
To communicate with the other systems the master system can be used.
LO4 Be able to manage LAN infrastructures
Task 4
In this section are to show ability towards monitoring and evaluation of LAN infrastructures
performance by reflecting and suggesting how the systems could have been improved
A.C 4.1 critically discuss how this LAN infrastructure will be monitored and managed (via
troubleshooting) if there is any issue during post implementation period.
Ans. To differentiate and clear the issues of system for achieving the increased performance. It
needs to be clear in the mind about the final goal for troubleshoot the Local Area Network issue, it
is important to keep monitoring the Local Area Network to identify the problems. Keeping an eye on
the LAN will be satisfied through the help of management of system.
Local Area Network troubleshooting can often be doubtful and the conditions of troubleshooting
include finding replicated IP on the system ,System application which has been configured wrongly,
devices which are low in performance , issues in cabling, LAN cards which are broken , switches of
the system , management of firewall , The system servers over burdened through the applications
of programming.
The issues faced in the LAN is due to a lot of reasons as it has been mentioned above . A
LAN/Network administrator responsibility is that they need to have a knowledge about the LAN
infrastructure, software , hardware of the network , preferences and user access rights . The best
option is to have a list of all the resources in the list which includes software installed, number of
workstations and network hardware.
The issues arouse in managing a LAN network to troubleshoot it these are the following strategies:
It needs to be verified that there is same class IP and the subnet related to it is present in all the
machines in your LAN. To make sure that the address is correct the gateway address needs to be
checked on the connected machine.
It needs to be make sure all the links of the system are plugged hard at both ends which means one
end is in the LAN card and HUB.
The settings of firewall needs to be checked and verified that firewall is not coming in between the
traffic.
To check connectivity PING command is used.
If the issue of integration is only with a particular machine then the driver of the NIC connector
needs to be reinstalled and if there is still issue then the NIC connector needs to be changed and
reconfigured.
If the issue of integration is not able to determined yet then the system link from machine to hub
needs to be checked.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
A.C 4.2 resolve LAN issues to improve security, reliability and performance
Resolve Security issues:
Risks on guarding is prone to happens to Local Area Network as there are nothing perfect system of
privacy or methods the privacy system and antivirus software’s and security system has been
appeared. To enhance the security of the LAN following steps needs to be followed:
An antivirus needs to be installed having all the updated definitions of virus and a spy ware system
and the server needs to be filtered frequently and also the machines present in the LAN
There should be a proxy server which needs to be taken in use to monitor so that all the applications
leading to be a threat in the security in the structure and characterization of specific access of web
standards for the clients.
Only the password which is complicated and strong for the process of encryption such that it cannot
get attacked by the person who is not authorized .
Logging is enabled for the entire system and server machine.
Security approaches needs to be implemented.
The framework in working should be updated and all the recent administrations needs to
introduced.
The machine’s registry is cleaned through the cleaner programming .
Firewall needs to be implemented.
Resolve performance and reliability issues:
All the issues that is because of the system performance happens because of the applications that
are familiarized powerfully, lapses in window registry , free spy ware frameworks , hardware which
is low and flawed, memory is low , system which is necessary , access which is synchronous to the
server for the resources which is same and in the surroundings which is unmanaged.
When the system is divided inside the subnets it is used in balancing the burden and performance
enhancement.
Pointless system needs to be removed which is going to make scanning rate of system.
All the cookies, files which are not useful and history is cleared.
RAM needs to be increased.
All the applications which are not necessary from machines needs to be installed.
Arrange Gateway machine, file server, proxy server, print server separately and on every server base
load is put.
The Local Area Network cards that helps speed of 10/100 Mbps needs to be installed.
The used switch inspite of Hub in the LAN.
Document Page
A.C 4.3 critically evaluate the performance of a LAN
There has been a increase in the number of Local area network rapidly which is estimated in being double
over the coming years. According to the perspective of economics and operation the organization
performance is critical. If the network is overpopulated then the performance of the LAN keeps on
decreasing and the productivity of the user suffers.
Networks have been growing rapidly on the past few years which provides a way to access the network
resources . As an example internet has been taken in use for importance to gain the network technology
has been adopted for many purposes which includes business, defence , banking and education. The
computer which are connected allows resource which is interactive sharing of resource between the pair
of system which are connected . There are a lot of step which has been taken in the wireless and wired
network. There are several networks which have been modelled by the researchers through network
simulators to find the most efficient one . These networks are being investigated through the simulation
techniques that helps in decreasing the prediction cost, network model implementation and estimation .
This gives consent to design and study the networks of communication , protocols , applications and
devices with scalability and flexibility. A wireless communication is a data communication which is flexible
and is implemented as an either as an wired communication which is alternative or extension of wired
communication.
To improve the performance perceived it is needed to be ensure that the application which is the most
important has the highest priority . Compression is the process which is actually the combination of
caching and the compression . Window size needs to be increased so that the sender do not have to wait
have to wait for the notification needs to send before another is sent so that the information does not
needs to be retransmitted when an error is occurred.
The performance can be bad because of the poor performance by the user the involvement of the user is
necessary as if the performance from the side of the user is not that efficient then there will be some lack
of efficiency in the system which is eventually going to result in the failure of the system.
This is how the performance is evaluated as these are factors which needs to be in consideration when we
are evaluating the performance of the local area network as the local area network is taken in a very large
demand expected that in the coming week it is going to be increasing and the usage of the local area
network is gradually going to increase.
Document Page
1 out of 10
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]